First published: Wed Jul 11 2012(Updated: )
`lib/puppet/defaults.rb` in Puppet 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, uses 0644 permissions for `last_run_report.yaml`, which allows local users to obtain sensitive configuration information by leveraging access to the puppet master server to read this file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/puppet | >=2.7.0<2.7.18 | 2.7.18 |
redhat/puppet | <2.7.18 | 2.7.18 |
Puppet | =2.7.2 | |
Puppet | =2.7.3 | |
Puppet | =2.7.4 | |
Puppet | =2.7.5 | |
Puppet | =2.7.6 | |
Puppet | =2.7.8 | |
Puppet | =2.7.9 | |
Puppet | =2.7.10 | |
Puppet | =2.7.11 | |
Puppet | =2.7.12 | |
Puppet | =2.7.13 | |
Puppet | =2.7.14 | |
Puppet | =2.7.16 | |
Puppet | <=2.7.17 | |
Puppet | =2.7.0 | |
Puppet | =2.7.1 | |
Puppet Enterprise | <=2.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3866 is considered a medium severity vulnerability due to potential exposure of sensitive configuration information.
To fix CVE-2012-3866, upgrade Puppet to version 2.7.18 or higher.
CVE-2012-3866 affects Puppet versions 2.7.x prior to 2.7.18 and Puppet Enterprise versions prior to 2.5.2.
CVE-2012-3866 requires local access to the puppet master server to exploit the vulnerability.
CVE-2012-3866 may expose sensitive configuration information contained in the last_run_report.yaml file.